
Juniper Networks Released Fixes For Critical Vulnerabilities
Juniper Networks Released Fixes For Critical Vulnerabilities CISA advised users and administrators to apply recently released fixes in Juniper Networks products due to several critical vulnerabil...

What is Dark Web Monitoring?
What is Dark Web Monitoring? As the most extensive worldwide system that stores information on everything (and almost everyone), the Internet comprises three distinct layers: the visible, the deep, an...

Cyber Kill Chain Model in Cyber Threat Intelligence
Cyber Kill Chain Model in Cyber Threat Intelligence Cybersecurity helps to reduce the risk of cyber-attacks and to eliminate the risks. Finding out the best solution to prevent the attacks i...

Expectations of SOC Team from CTI
Expectations of SOC Team from CTI Every company with an online component to its business needs cyber awareness; it also requires a Security Operations Center (SOC) if the online part is big enough. A ...

Top 5 Dark Web Forums
Top 5 Dark Web Forums There are many hacker forums in the dark web world. Apart from the forums that first come to mind for illegal drug sales, human trafficking, and pornographic content, i...

7 Books Every CISO Bookshelf Should Have
7 Books Every CISO Bookshelf Should Have The position of Chief Information Security Officer (CISO) is relatively new and has just received recognition from the CxO community and board of directors at ...

10 Best SIEM Tools, Products & Providers List
10 Best SIEM Tools, Products & Providers List SIEM solutions are vital to log management and complete security. Here is a list of the finest SIEM tools for organizations wanting to add or improve ...

Dark Web Stories: Traditional Article Competition
Dark Web Stories: Traditional Article Competition One can find various sites inaccessible from the surface web on the dark web, including black markets, leak sites, hacker forums, and many more sites,...

Major Cyber Attacks in Review: June 2022
Major Cyber Attacks in Review: June 2022 You can follow the major cyber security attacks of each month on SOCRadar’s “Radar” page! We experienced critical days last month due to...

Checkmate Ransomware Targets QNAP SMB Services
Checkmate Ransomware Targets QNAP SMB Services New Checkmate ransomware has been discovered targeting QNAP NAS devices. Although the attacks are still being investigated, it is known that these new r...

Under the Spotlight: RAMP Forum
Under the Spotlight: RAMP Forum In July 2021, a new Russian-speaking forum called RAMP, Russian Anonymous Market Place, which attracts a lot of interest from researchers and cybercriminals, was forme...

Brute Ratel Utilized By Threat Actors In New Ransomware Operations
Brute Ratel Utilized By Threat Actors In New Ransomware Operations When Brute Ratel first appeared in the wild, almost no security solutions could detect it. To avoid being discovered by EDR and antiv...

NPM Packages Used In A Supply Chain Attack
NPM Packages Used In A Supply Chain Attack Hundreds of desktop applications and websites were compromised by an NPM supply chain attack that started in December 2021, using malicious NPM packages wit...

Top 5 Phishing Resources for SOC Teams
Top 5 Phishing Resources for SOC Teams Phishing is a cyber-attack in which attackers defraud their victims through email, text messaging, phone calls, or websites. Attackers redirect their victims to ...

RedAlert Ransomware Targets Windows and Linux VMware ESXi Servers
RedAlert Ransomware Targets Windows and Linux VMware ESXi Servers RedAlert is a new ransomware operation aiming to encrypt Windows and Linux VMWare ESXi servers on corporate networks using the NTRUEnc...

AstraLocker Shut Down Their Operations and Released Decryptor
AstraLocker Shut Down Their Operations and Released Decryptor A ransomware gang AstraLocker, recently announced they are shutting down their operations and shared decryptors related to all the campaig...

Top 5 Tactics Threat Actors Use for Initial Access
Top 5 Tactics Threat Actors Use for Initial Access A short while ago, combined security advice released by several national cybersecurity agencies highlighted the top ten attack vectors most used by t...

What are DevOps, DevSecOps, and Rugged DevOps?
What are DevOps, DevSecOps, and Rugged DevOps? We are hearing these two buzzwords, DevSecOps and DevOps, more frequently. For example, Gartner predicts DevSecOps will reach mainstream adoption within ...

Hundreds of Windows Networks are Infected with Raspberry Robin Worm
Hundreds of Windows Networks are Infected with Raspberry Robin Worm [Update] February 12, 2024: “Raspberry Robin Malware Advances with New One-Day Exploits” Microsoft reported that hundred...

SOCRadar Denmark Threat Landscape Report: 9 Danish Companies Targeted ...
SOCRadar Denmark Threat Landscape Report: 9 Danish Companies Targeted Every 9 Days Cybercrime is a threat that closely concerns public authorities, companies, and residents in Denmark, as it is around...